<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Association — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-association/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-association/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows File Association Modification via Ftype Command</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-ftype-file-association/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-ftype-file-association/</guid><description>Adversaries can use the `ftype` command to modify Windows file associations, potentially redirecting legitimate file execution to malicious payloads for persistence, execution, and defense evasion.</description><content:encoded><![CDATA[<p>The <code>ftype</code> command is a Windows built-in utility that allows users to query and modify file type associations. While legitimate uses exist, adversaries can abuse this functionality to establish persistence, execute arbitrary code, and evade security controls. By modifying file associations, attackers can redirect the execution of legitimate file types (e.g., .txt, .doc, .exe) to malicious payloads. This can be used to maintain access to a compromised system even after a reboot or to bypass application whitelisting. This activity is often performed post-exploitation after an attacker has gained initial access to a system. Defenders should monitor for unauthorized or unexpected use of the <code>ftype</code> command to identify potential malicious activity. The original Splunk detection was published in 2026, indicating that the technique has been publicly known and detectable for some time.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through exploitation or social engineering.</li>
<li>The attacker executes an elevated command prompt or PowerShell session.</li>
<li>The attacker uses the <code>ftype</code> command to query existing file associations to identify a suitable target.</li>
<li>The attacker uses the <code>ftype</code> command to modify the file association of a targeted file extension (e.g., &ldquo;.txt&rdquo;) to point to a malicious executable.</li>
<li>A user double-clicks a file with the modified extension (e.g., a .txt file).</li>
<li>Instead of opening in a text editor, the associated malicious executable is launched.</li>
<li>The malicious executable performs its intended actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker maintains persistence and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code with the privileges of the user who opens the associated file. This can lead to the installation of malware, data theft, and further compromise of the network. The number of victims and sectors targeted depends on the attacker&rsquo;s objectives. If the attack succeeds, it can result in significant data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details for detection. This can be achieved through Sysmon or Windows Event Logging (Security Event ID 4688) (reference: Sysmon EventID 1, Windows Event Log Security 4688).</li>
<li>Deploy the Sigma rule <code>Detect File Association Modification via Ftype</code> to your SIEM and tune for your environment.</li>
<li>Monitor for processes executing from unusual locations or with unexpected command-line arguments after a file association modification event.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized executables.</li>
<li>Review and audit existing file associations for any suspicious or unexpected configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>file-association</category><category>persistence</category><category>execution</category><category>windows</category></item></channel></rss>